All releases of The GNU Privacy Guard

Release Notes: This release fixes the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. Also, by default only the major version number is printed on armored output, a trustdb file is not created when --ttrust-model=always is used, keyid for key packets are printed when --list-packets is used, and the modular exponentiation algorithm has been changed to recover from a small performance loss in version 1.4.14.

Release Notes: With gpg-agent, by default users are now asked via the Pinentry whether they trust an X.509
root key.
To prohibit interactive marking of such keys,
the new option --no-allow-mark-trusted may be
used.
The command KEYINFO has options to add info from sshcontrol for gpg-agent.
The included ssh agent now supports ECDSA keys.
The new option --enable-putty-support allows gpg-agent to act on Windows as a Pageant
replacement with full smartcard support.
This release supports installation as a portable application under Windows.

Release Notes: Decryption using smartcards keys larger than 3072 now works. A new meta option ignore-invalid-option was introduced to allow using the same option file by other GnuPG versions. The hash algorithm is now printed for sig records in key listings. Invalid keyblock packets are now skipped during import to avoid a DoS. Ports from DNS SRV records are now correctly handled. Many further minor bugs were fixed.

Release Notes: The Yarom/Falkner flush+reload side-channel attack on RSA secret keys is now mitigated. IDEA was fixed for big-endian CPUs. The diagnostics for failed keyserver lookups were improved. Several further bugs and portability issues were fixed.

Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.

Release Notes: A space-separated fingerprint is now accepted as a user ID, to ease copying and pasting. The longest key ID available is now used by default. Support for the original HKP keyserver has been dropped. The trustdb is now rebuilt after changing the option "--min-cert-level". The option "--cert-digest-algo" is now honored when creating a cert. Detection of JPEG files has been improved.

Release Notes: A space separated fingerprint is now accepted as a user ID. This allows you to copy and paste the fingerprint from the key listing. Support for the original HKP keyserver was removed. The trustdb is now rebuilt after changing the option --min-cert-level. JPEG detection was improved. More VMS patches are now included. File locking was made more portable. The 32-bit variant of the mingw-w64 toolchain is now supported. Minor bugs were fixed.

Release Notes: Compatibility with newer versions of libgcrypt was restored. dirmngr/gpgsm interaction was improved for OCSP. Card keys can now be generated up to 4096 bits. The SSH confirm flag is now supported, and SSH fingerprints are shown in SSH related pinentries.

Release Notes: More hash algorithms are now possible with the OpenPGP v2 card. gpg-agent now tests for a new gpg-agent.conf configuration file on a SIGHUP. The output of "gpgconf --check-options" was fixed. A bug where scdaemon sends a signal to gpg-agent running in non-daemon mode was fixed. TTY management for pinentries and a session variable update problem were fixed. Further minor bugfixes were made.